Q
Manage Learn to apply best practices and optimize your operations.

# Cracking smaller messages

## Learn whether or not a smaller message is easier to crack and how encryption makes plaintext plausible. Also learn how to encrypt a message and why you should consider using a smaller key.

If a message is smaller, is it easier to decrypt?

A smaller message does in fact take less time to decrypt than a longer one, however, I think you meant crack, as in recover the plaintext of a message without the encryption key, and the answer is basically no. This is because good encryption makes any plaintext derived from a given ciphertext as plausible as any other.

One advantage of a small message is that it is easier to encrypt it by creating a random key that is the same size as the message. Matching the key and message lengths creates what's called a one-time pad. This uses character-by-character encryption, or stream ciphering. This type of cryptosystem is unbreakable, if used correctly. Let me give you an example. Suppose you encrypt your eight-digit bank account number. The length of this message may give an attacker a clue as to its content, but they won't know if they've cracked the message, since any of the 10^8 permutations of an eight-digit number could be correct. This is true for text-based messages as well. If I encrypted the message "Defuse bomb mission off," which is 23 characters long, with a one-time pad, an attacker wouldn't be able to determine whether "Detonate bombs at three" -- also 23 characters -- was the message I sent.

The problem with one-time pads is that you have to generate a new random key each time you send a message. This means creating, delivering, and securing large keys, which is very complex. Imagine if you wanted to encrypt a 2Mb computer file with a one-time pad. You would need a key that is also 2Mb or 2^20 characters long. This limits true one-time pad systems to very specific uses so other encryption systems are more generally used. In block ciphers for example, the key length is much less than the length of the message, but the plaintext message is broken up into small pieces called blocks, and the key encrypts each block. A variety of block ciphers operate in different ways, but as a rule, the smaller the key the less secure any message encrypted with that key will be. Therefore, you need to ensure that you use an adequate length of key and that your key or keys are adequately protected and genuinely random.

• Learn tactics for securing your e-mail systems

• This was last published in September 2005

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchCloudSecurity

• ### CASB market dynamics, from a customer perspective

The CASB market is changing. Learn how the fluctuating threat landscape has led to a use case evolution and operational changes ...

• ### Top 4 strategies for cloud security automation

Automating security in the cloud can be invaluable for threat detection and mitigation. These are the key focal areas where ...

• ### Another Amazon S3 leak exposes Attunity data, credentials

UpGuard security researchers found publicly exposed Amazon S3 buckets from data management firm Attunity, which included company ...

## SearchNetworking

• ### An introduction to smart NICs and their benefits

This introduction discusses how smart NICs work and how they can benefit data center servers. It also explores the smart NIC ...

• ### What are the features and benefits of 5G technology for businesses?

In addition to high speeds and low latency, the emergence of 5G cellular technology could put some pressure on the market prices ...

• ### Why did operator NFV adoption lag so much?

NFV adoption was hampered by high costs and deployment issues, according to one industry insider. Also, learn about the latest on...

## SearchCIO

• ### How edge computing differs from decentralized computing

Edge computing isn't about sticking servers and storage in a branch location. Learn the critical differences between edge and ...

• ### Facebook's Libra project -- why enterprises should prepare

Facebook's foray into cryptocurrency is setting off alarm bells in government and finance circles. The question is how could the ...

• ### Ransomware attacks: How to get the upper hand

Ransomware attacks are on the rise. Can organizations play like Radiohead and refuse to pay? The answer from security experts is ...

## SearchEnterpriseDesktop

• ### 3 Windows 10 known issues and how to fix them

There are a few issues that accompanied the Windows 10 1903 update. Before deploying the latest update, IT admins should ...

• ### Despite Windows 10 issues, customers remain confident in OS

The issues surrounding the latest Windows 10 OS update have affected some users to the point of annoyance, while others remain ...

• ### How to take advantage of 3 features in Windows 1903 update

Windows Autopilot, reserved storage and SetupDiag are three new features in Windows 10. Here's how IT admins can use them for ...

## SearchCloudComputing

• ### Hearst puts cloud governance first in move to AWS, Azure

Cloud governance, both from a security and cost perspective, was crucial for Hearst Corp. as it moved its IT operations to AWS ...

• ### Manage cloud APIs wisely with these 4 tips

Users can get caught in the weeds of APIs in the cloud. Learn the best tools, top factors and cost optimization techniques for ...

• ### Why the PaaS market failed to live up to the hype

PaaS' days as a stand-alone tech may be numbered as the cloud layer gets absorbed by IaaS platforms from AWS and others. See what...

## ComputerWeekly.com

• ### Second CyberThreat Summit announced by NCSC and SANS Institute

CyberThreat 2019 aims to bring together a more diverse set of technical professionals in cyber security from the private and ...

• ### Apollo 11: From one small step to interplanetary computing

Neil Armstrong stepped onto the lunar surface on July 20, 1969. Computers in space have come a long way since then

• ### London Underground 4G plan will lead to wider fibre broadband backbone

The Jubilee Line will be first Tube service to offer 4G through tunnels, and the cabling to support the service will become part ...

Close